Commutative Watermarking-Encryption of Multimedia Data Based on Histograms

In this chapter, histogram-based watermarking schemes which are capable of being integrated into a CWE scheme are described. For still images, it is well known that histogram-based watermarking schemes are resistant to permutations of image pixels. In particular, using histograms implies robustness against rotation, scaling and translation (RST) of images. In (Schmitz, 2012) this fact has been utilized to devise a commutative watermarking-encryption (CWE) scheme by choosing a permutation cipher for encryption and a histogram-based scheme for watermarking.

[1]  Jiwu Huang,et al.  Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping , 2009, IWDW.

[2]  Mohan S. Kankanhalli,et al.  Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.

[3]  Shiguo Lian,et al.  Quasi-commutative watermarking and encryption for secure media content distribution , 2009, Multimedia Tools and Applications.

[4]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[5]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[6]  Jianping Li,et al.  Context-based watermarking cum chaotic encryption for medical images in telemedicine applications , 2018, Multimedia Tools and Applications.

[7]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[8]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[9]  Xinpeng Zhang,et al.  Towards More Robust Commutative Watermarking-Encryption of Images , 2013, 2013 IEEE International Symposium on Multimedia.

[10]  C. Lin,et al.  Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing , 2006 .

[11]  Xinpeng Zhang,et al.  A New Approach to Commutative Watermarking-Encryption , 2012, Communications and Multimedia Security.

[12]  Xinpeng Zhang,et al.  Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy , 2015, ACIVS.

[13]  Zhengquan Xu,et al.  On the provably secure CEW based on orthogonal decomposition , 2014, Signal Process. Image Commun..

[14]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[15]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[16]  Xinpeng Zhang,et al.  Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms , 2014, Int. J. Multim. Data Eng. Manag..

[17]  Roland Schmitz,et al.  Commutative Watermarking-Encryption of Audio Data with Minimum Knowledge Verification , 2017, Adv. Multim..

[18]  Jiwu Huang,et al.  Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[19]  M. Vijayaraj,et al.  An optimal approach for watermarking using MRC4 encryption scheme , 2017, Cluster Computing.

[20]  Rik Van de Walle,et al.  End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation , 2013, IEEE Signal Process. Mag..

[21]  Shiguo Lian,et al.  Commutative watermarking and encryption for media data , 2006 .

[22]  Hichem Sahbi,et al.  Using entropy for image and video authentication watermarks , 2006, Electronic Imaging.